Author of the publication

Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.

, , , and . USENIX Security Symposium, USENIX Association, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatically Identifying Trigger-based Behavior in Malware., , , , , and . Botnet Detection, volume 36 of Advances in Information Security, Springer, (2008)Automated Identification of Sensitive Data via Flexible User Requirements., and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 151-171. Springer, (2018)Automated identification of sensitive data from implicit user specification., and . Cybersecurity, 1 (1): 13 (2018)Expanding Malware Defense by Securing Software Installations., , , and . DIMVA, volume 5137 of Lecture Notes in Computer Science, page 164-185. Springer, (2008)Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions., , , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 859-876. Springer, (2012)Immunizing Servers from Buffer-Overflow Attacks, , and . Adaptive and Resilient Computing Security Workshop, (November 2004)Scrutinizing Implementations of Smart Home Integrations., , , , , , and . IEEE Trans. Software Eng., 47 (12): 2667-2683 (2021)Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis., , , , and . NDSS, The Internet Society, (2012)A Usage-Pattern Perspective for Privacy Ranking of Android Apps., , and . ICISS, volume 8880 of Lecture Notes in Computer Science, page 245-256. Springer, (2014)Golden implementation driven software debugging., , , and . SIGSOFT FSE, page 177-186. ACM, (2010)